PageRenderTime 58ms CodeModel.GetById 13ms app.highlight 32ms RepoModel.GetById 1ms app.codeStats 1ms

/opennms-base-assembly/src/main/filtered/etc/events/Cisco.airespace.xml

https://github.com/ajakubo1/opennms
XML | 5083 lines | 4771 code | 308 blank | 4 comment | 0 complexity | abb0a33e928325c0e78eb8a45c66bdc8 MD5 | raw file

Large files files are truncated, but you can click here to view the full file

   1<!-- Start of auto generated data from MIB: AIRESPACE-WIRELESS-MIB -->
   2<events xmlns="http://xmlns.opennms.org/xsd/eventconf">
   3<event>
   4	<mask>
   5		<maskelement>
   6			<mename>id</mename>
   7			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
   8		</maskelement>
   9		<maskelement>
  10			<mename>generic</mename>
  11			<mevalue>6</mevalue>
  12		</maskelement>
  13		<maskelement>
  14			<mename>specific</mename>
  15			<mevalue>1</mevalue>
  16		</maskelement>
  17	</mask>
  18	<uei>uei.opennms.org/vendor/cisco/bsnDot11StationDisassociate</uei>
  19	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationDisassociate</event-label>
  20	<descr>
  21&lt;p&gt;The disassociate notification shall be sent when the Station
  22sends a Disassociation frame. The value of the notification
  23shall include the MAC address of the MAC to which the 
  24Disassociation frame was sent and the reason for the 
  25disassociation&lt;/p&gt;&lt;table&gt;
  26	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  27
  28	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  29	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  30	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  31
  32	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  33	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  34	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  35
  36	bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  37	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  38		unspecified(1)
  39		previousAuthNotValid(2)
  40		deauthenticationLeaving(3)
  41		disassociationDueToInactivity(4)
  42		disassociationAPBusy(5)
  43		class2FrameFromNonAuthStation(6)
  44		class2FrameFromNonAssStation(7)
  45		disassociationStaHasLeft(8)
  46		staReqAssociationWithoutAuth(9)
  47		missingReasonCode(99)
  48	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  49	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  50
  51	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  52	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  53	</descr>
  54		<logmsg dest='logndisplay'>&lt;p&gt;
  55			bsnDot11StationDisassociate trap received 
  56			bsnStationAPMacAddr=%parm[#1]% 
  57			bsnStationAPIfSlotId=%parm[#2]% 
  58			bsnStationReasonCode=%parm[#3]% 
  59			bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
  60		</logmsg>
  61	<severity>Normal</severity>
  62	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  63</event>
  64<event>
  65	<mask>
  66		<maskelement>
  67			<mename>id</mename>
  68			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  69		</maskelement>
  70		<maskelement>
  71			<mename>generic</mename>
  72			<mevalue>6</mevalue>
  73		</maskelement>
  74		<maskelement>
  75			<mename>specific</mename>
  76			<mevalue>2</mevalue>
  77		</maskelement>
  78	</mask>
  79	<uei>uei.opennms.org/vendor/cisco/bsnDot11StationDeauthenticate</uei>
  80	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationDeauthenticate</event-label>
  81	<descr>
  82&lt;p&gt;The deauthenticate notification shall be sent when the Station
  83sends a Deauthentication frame. The value of the notification
  84shall include the MAC address of the MAC to which the
  85Deauthentication frame was sent and the reason for the
  86deauthentication.&lt;/p&gt;&lt;table&gt;
  87	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  88
  89	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  90	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  91	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  92
  93	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  94	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  95	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  96
  97	bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  98	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  99		unspecified(1)
 100		previousAuthNotValid(2)
 101		deauthenticationLeaving(3)
 102		disassociationDueToInactivity(4)
 103		disassociationAPBusy(5)
 104		class2FrameFromNonAuthStation(6)
 105		class2FrameFromNonAssStation(7)
 106		disassociationStaHasLeft(8)
 107		staReqAssociationWithoutAuth(9)
 108		missingReasonCode(99)
 109	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 110	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 111
 112	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 113	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 114	</descr>
 115		<logmsg dest='logndisplay'>&lt;p&gt;
 116			bsnDot11StationDeauthenticate trap received 
 117			bsnStationAPMacAddr=%parm[#1]% 
 118			bsnStationAPIfSlotId=%parm[#2]% 
 119			bsnStationReasonCode=%parm[#3]% 
 120			bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
 121		</logmsg>
 122	<severity>Normal</severity>
 123	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
 124</event>
 125<event>
 126	<mask>
 127		<maskelement>
 128			<mename>id</mename>
 129			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 130		</maskelement>
 131		<maskelement>
 132			<mename>generic</mename>
 133			<mevalue>6</mevalue>
 134		</maskelement>
 135		<maskelement>
 136			<mename>specific</mename>
 137			<mevalue>3</mevalue>
 138		</maskelement>
 139	</mask>
 140	<uei>uei.opennms.org/vendor/cisco/bsnDot11StationAuthenticateFail</uei>
 141	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationAuthenticateFail</event-label>
 142	<descr>
 143&lt;p&gt;The authenticate failure notification shall be sent when the 
 144Station sends an Authentication frame with a status code other
 145than 'successful'. The value of the notification shall include
 146the MAC address of the MAC to which the Authentication
 147frame was sent and the reason for the authentication failure.&lt;/p&gt;&lt;table&gt;
 148	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 149
 150	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 151	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 152	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 153
 154	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 155	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 156	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 157
 158	bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 159	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 160		unspecified(1)
 161		previousAuthNotValid(2)
 162		deauthenticationLeaving(3)
 163		disassociationDueToInactivity(4)
 164		disassociationAPBusy(5)
 165		class2FrameFromNonAuthStation(6)
 166		class2FrameFromNonAssStation(7)
 167		disassociationStaHasLeft(8)
 168		staReqAssociationWithoutAuth(9)
 169		missingReasonCode(99)
 170	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 171	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 172
 173	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 174	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 175	</descr>
 176		<logmsg dest='logndisplay'>&lt;p&gt;
 177			bsnDot11StationAuthenticateFail trap received 
 178			bsnStationAPMacAddr=%parm[#1]% 
 179			bsnStationAPIfSlotId=%parm[#2]% 
 180			bsnStationReasonCode=%parm[#3]% 
 181			bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
 182		</logmsg>
 183	<severity>Warning</severity>
 184	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
 185</event>
 186<event>
 187	<mask>
 188		<maskelement>
 189			<mename>id</mename>
 190			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 191		</maskelement>
 192		<maskelement>
 193			<mename>generic</mename>
 194			<mevalue>6</mevalue>
 195		</maskelement>
 196		<maskelement>
 197			<mename>specific</mename>
 198			<mevalue>4</mevalue>
 199		</maskelement>
 200	</mask>
 201	<uei>uei.opennms.org/vendor/cisco/bsnDot11StationAssociateFail</uei>
 202	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationAssociateFail</event-label>
 203	<descr>
 204&lt;p&gt;The associate failure notification shall be sent when the 
 205Station sends an Association frame with a status code other 
 206than 'successful'. The value of the notification
 207shall include the MAC address of the MAC to which the 
 208Authentication frame was sent and the reason for the 
 209authentication failure.&lt;/p&gt;&lt;table&gt;
 210	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 211
 212	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 213	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 214	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 215
 216	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 217	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 218	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 219
 220	bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 221	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 222		unspecified(1)
 223		previousAuthNotValid(2)
 224		deauthenticationLeaving(3)
 225		disassociationDueToInactivity(4)
 226		disassociationAPBusy(5)
 227		class2FrameFromNonAuthStation(6)
 228		class2FrameFromNonAssStation(7)
 229		disassociationStaHasLeft(8)
 230		staReqAssociationWithoutAuth(9)
 231		missingReasonCode(99)
 232	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 233	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 234
 235	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 236	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 237	</descr>
 238		<logmsg dest='logndisplay'>&lt;p&gt;
 239			bsnDot11StationAssociateFail trap received 
 240			bsnStationAPMacAddr=%parm[#1]% 
 241			bsnStationAPIfSlotId=%parm[#2]% 
 242			bsnStationReasonCode=%parm[#3]% 
 243			bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
 244		</logmsg>
 245	<severity>Warning</severity>
 246	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
 247</event>
 248<event>
 249	<mask>
 250		<maskelement>
 251			<mename>id</mename>
 252			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 253		</maskelement>
 254		<maskelement>
 255			<mename>generic</mename>
 256			<mevalue>6</mevalue>
 257		</maskelement>
 258		<maskelement>
 259			<mename>specific</mename>
 260			<mevalue>5</mevalue>
 261		</maskelement>
 262	</mask>
 263	<uei>uei.opennms.org/vendor/cisco/bsnAPUp</uei>
 264	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPUp</event-label>
 265	<descr>
 266&lt;p&gt;When Airespace AP operation status goes up this trap will be 
 267sent&lt;/p&gt;&lt;table&gt;
 268	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 269
 270	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 271	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 272	</descr>
 273		<logmsg dest='logndisplay'>&lt;p&gt;
 274			bsnAPUp trap received 
 275			bsnAPDot3MacAddress=%parm[#1]%&lt;/p&gt;
 276		</logmsg>
 277	<severity>Normal</severity>
 278	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPDown:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
 279</event>
 280<event>
 281	<mask>
 282		<maskelement>
 283			<mename>id</mename>
 284			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 285		</maskelement>
 286		<maskelement>
 287			<mename>generic</mename>
 288			<mevalue>6</mevalue>
 289		</maskelement>
 290		<maskelement>
 291			<mename>specific</mename>
 292			<mevalue>6</mevalue>
 293		</maskelement>
 294	</mask>
 295	<uei>uei.opennms.org/vendor/cisco/bsnAPDown</uei>
 296	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPDown</event-label>
 297	<descr>
 298&lt;p&gt;When Airespace AP operation status goes down this trap will be
 299sent&lt;/p&gt;&lt;table&gt;
 300	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 301
 302	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 303	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 304	</descr>
 305		<logmsg dest='logndisplay'>&lt;p&gt;
 306			bsnAPDown trap received 
 307			bsnAPDot3MacAddress=%parm[#1]%&lt;/p&gt;
 308		</logmsg>
 309	<severity>Major</severity>
 310	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
 311</event>
 312<event>
 313	<mask>
 314		<maskelement>
 315			<mename>id</mename>
 316			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 317		</maskelement>
 318		<maskelement>
 319			<mename>generic</mename>
 320			<mevalue>6</mevalue>
 321		</maskelement>
 322		<maskelement>
 323			<mename>specific</mename>
 324			<mevalue>7</mevalue>
 325		</maskelement>
 326	</mask>
 327	<uei>uei.opennms.org/vendor/cisco/bsnAPAssociated</uei>
 328	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPAssociated</event-label>
 329	<descr>
 330&lt;p&gt;When Airespace AP Associates to a Airespace Switch, AP 
 331associated notification will be sent with dot3 MAC address of 
 332Airespace AP.This will help management system to discover 
 333Airespace AP and add to system.&lt;/p&gt;&lt;table&gt;
 334	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 335
 336	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 337	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 338	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 339
 340	bsnAPPortNumberTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 341	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 342	</descr>
 343		<logmsg dest='logndisplay'>&lt;p&gt;
 344			bsnAPAssociated trap received 
 345			bsnAPMacAddrTrapVariable=%parm[#1]% 
 346			bsnAPPortNumberTrapVariable=%parm[#2]%&lt;/p&gt;
 347		</logmsg>
 348	<severity>Normal</severity>
 349	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPDisassociated:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" auto-clean="false" />
 350</event>
 351<event>
 352	<mask>
 353		<maskelement>
 354			<mename>id</mename>
 355			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 356		</maskelement>
 357		<maskelement>
 358			<mename>generic</mename>
 359			<mevalue>6</mevalue>
 360		</maskelement>
 361		<maskelement>
 362			<mename>specific</mename>
 363			<mevalue>8</mevalue>
 364		</maskelement>
 365	</mask>
 366	<uei>uei.opennms.org/vendor/cisco/bsnAPDisassociated</uei>
 367	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPDisassociated</event-label>
 368	<descr>
 369&lt;p&gt;When Airespace AP disassociates from Airespace Switch, AP 
 370disassociated notification will be sent with dot3 MAC address
 371of Airespace AP management system to remove Airespace AP from
 372this Airespace Switch&lt;/p&gt;&lt;table&gt;
 373	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 374
 375	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 376	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 377	</descr>
 378		<logmsg dest='logndisplay'>&lt;p&gt;
 379			bsnAPDisassociated trap received 
 380			bsnAPMacAddrTrapVariable=%parm[#1]%&lt;/p&gt;
 381		</logmsg>
 382	<severity>Warning</severity>
 383	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 384</event>
 385<event>
 386	<mask>
 387		<maskelement>
 388			<mename>id</mename>
 389			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 390		</maskelement>
 391		<maskelement>
 392			<mename>generic</mename>
 393			<mevalue>6</mevalue>
 394		</maskelement>
 395		<maskelement>
 396			<mename>specific</mename>
 397			<mevalue>9</mevalue>
 398		</maskelement>
 399	</mask>
 400	<uei>uei.opennms.org/vendor/cisco/bsnAPIfUp</uei>
 401	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPIfUp</event-label>
 402	<descr>
 403&lt;p&gt;When Airespace AP's interface's operation status goes up this
 404trap will be sent&lt;/p&gt;&lt;table&gt;
 405	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 406
 407	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 408	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 409	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 410
 411	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 412	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 413	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 414
 415	bsnAPPortNumber&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 416	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 417	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 418
 419	bsnAPIfUpDownCause&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 420	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 421		unknown(0)
 422		radioFailure(1)
 423		radioLowPower(2)
 424		maxRetransmission(3)
 425		echoTimeout(4)
 426		configAP(5)
 427		configRadio(6)
 428		configNetwork(7)
 429	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 430	</descr>
 431		<logmsg dest='logndisplay'>&lt;p&gt;
 432			bsnAPIfUp trap received 
 433			bsnAPDot3MacAddress=%parm[#1]% 
 434			bsnAPIfSlotId=%parm[#2]% 
 435			bsnAPPortNumber=%parm[#3]% 
 436			bsnAPIfUpDownCause=%parm[#4]%&lt;/p&gt;
 437		</logmsg>
 438	<severity>Normal</severity>
 439	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPIfDown:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
 440</event>
 441<event>
 442	<mask>
 443		<maskelement>
 444			<mename>id</mename>
 445			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 446		</maskelement>
 447		<maskelement>
 448			<mename>generic</mename>
 449			<mevalue>6</mevalue>
 450		</maskelement>
 451		<maskelement>
 452			<mename>specific</mename>
 453			<mevalue>10</mevalue>
 454		</maskelement>
 455	</mask>
 456	<uei>uei.opennms.org/vendor/cisco/bsnAPIfDown</uei>
 457	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPIfDown</event-label>
 458	<descr>
 459&lt;p&gt;When Airespace AP's interface's operation status goes down 
 460this trap will be sent.&lt;/p&gt;&lt;table&gt;
 461	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 462
 463	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 464	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 465	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 466
 467	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 468	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 469	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 470
 471	bsnAPAdminStatus&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 472	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 473		enable(1)
 474		disable(2)
 475	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 476	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 477
 478	bsnAPIfAdminStatus&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 479	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 480		enable(1)
 481		disable(2)
 482	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 483	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 484
 485	bsnAPIfUpDownCause&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 486	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 487		unknown(0)
 488		radioFailure(1)
 489		radioLowPower(2)
 490		maxRetransmission(3)
 491		echoTimeout(4)
 492		configAP(5)
 493		configRadio(6)
 494		configNetwork(7)
 495	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 496	</descr>
 497		<logmsg dest='logndisplay'>&lt;p&gt;
 498			bsnAPIfDown trap received 
 499			bsnAPDot3MacAddress=%parm[#1]% 
 500			bsnAPIfSlotId=%parm[#2]% 
 501			bsnAPAdminStatus=%parm[#3]% 
 502			bsnAPIfAdminStatus=%parm[#4]% 
 503			bsnAPIfUpDownCause=%parm[#5]%&lt;/p&gt;
 504		</logmsg>
 505	<severity>Warning</severity>
 506	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
 507</event>
 508<event>
 509	<mask>
 510		<maskelement>
 511			<mename>id</mename>
 512			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 513		</maskelement>
 514		<maskelement>
 515			<mename>generic</mename>
 516			<mevalue>6</mevalue>
 517		</maskelement>
 518		<maskelement>
 519			<mename>specific</mename>
 520			<mevalue>11</mevalue>
 521		</maskelement>
 522	</mask>
 523	<uei>uei.opennms.org/vendor/cisco/bsnAPLoadProfileFailed</uei>
 524	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPLoadProfileFailed</event-label>
 525	<descr>
 526&lt;p&gt;When LOAD Profile state changes from PASS to FAIL, 
 527notification will be sent with Dot3 MAC address of Airespace 
 528AP and slot ID of Airespace AP IF. This trap sending can be 
 529enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
 530	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 531
 532	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 533	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 534	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 535
 536	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 537	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 538	</descr>
 539		<logmsg dest='logndisplay'>&lt;p&gt;
 540			bsnAPLoadProfileFailed trap received 
 541			bsnAPDot3MacAddress=%parm[#1]% 
 542			bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
 543		</logmsg>
 544	<severity>Warning</severity>
 545	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 546</event>
 547<event>
 548	<mask>
 549		<maskelement>
 550			<mename>id</mename>
 551			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 552		</maskelement>
 553		<maskelement>
 554			<mename>generic</mename>
 555			<mevalue>6</mevalue>
 556		</maskelement>
 557		<maskelement>
 558			<mename>specific</mename>
 559			<mevalue>12</mevalue>
 560		</maskelement>
 561	</mask>
 562	<uei>uei.opennms.org/vendor/cisco/bsnAPNoiseProfileFailed</uei>
 563	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPNoiseProfileFailed</event-label>
 564	<descr>
 565&lt;p&gt;When Noise Profile state changes from PASS to FAIL, 
 566notification will be sent with Dot3 MAC address of Airespace 
 567AP and slot ID of Airespace AP IF. This trap sending can be 
 568enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
 569	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 570
 571	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 572	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 573	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 574
 575	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 576	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 577	</descr>
 578		<logmsg dest='logndisplay'>&lt;p&gt;
 579			bsnAPNoiseProfileFailed trap received 
 580			bsnAPDot3MacAddress=%parm[#1]% 
 581			bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
 582		</logmsg>
 583	<severity>Warning</severity>
 584	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 585</event>
 586<event>
 587	<mask>
 588		<maskelement>
 589			<mename>id</mename>
 590			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 591		</maskelement>
 592		<maskelement>
 593			<mename>generic</mename>
 594			<mevalue>6</mevalue>
 595		</maskelement>
 596		<maskelement>
 597			<mename>specific</mename>
 598			<mevalue>13</mevalue>
 599		</maskelement>
 600	</mask>
 601	<uei>uei.opennms.org/vendor/cisco/bsnAPInterferenceProfileFailed</uei>
 602	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPInterferenceProfileFailed</event-label>
 603	<descr>
 604&lt;p&gt;When Interference Profile state changes from PASS to FAIL,
 605notification will be sent with Dot3 MAC address of Airespace 
 606AP and slot ID of Airespace AP IF. This trap sending can be 
 607enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
 608	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 609
 610	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 611	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 612	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 613
 614	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 615	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 616	</descr>
 617		<logmsg dest='logndisplay'>&lt;p&gt;
 618			bsnAPInterferenceProfileFailed trap received 
 619			bsnAPDot3MacAddress=%parm[#1]% 
 620			bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
 621		</logmsg>
 622	<severity>Warning</severity>
 623	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 624</event>
 625<event>
 626	<mask>
 627		<maskelement>
 628			<mename>id</mename>
 629			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 630		</maskelement>
 631		<maskelement>
 632			<mename>generic</mename>
 633			<mevalue>6</mevalue>
 634		</maskelement>
 635		<maskelement>
 636			<mename>specific</mename>
 637			<mevalue>14</mevalue>
 638		</maskelement>
 639	</mask>
 640	<uei>uei.opennms.org/vendor/cisco/bsnAPCoverageProfileFailed</uei>
 641	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCoverageProfileFailed</event-label>
 642	<descr>
 643&lt;p&gt;When Coverage Profile state changes from PASS to FAIL, 
 644notification will be sent with Dot3 MAC address of Airespace 
 645AP and slot ID of Airespace AP IF. This trap sending can be 
 646enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
 647	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 648
 649	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 650	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 651	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 652
 653	bsnAPNameTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 654	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 655	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 656
 657	bsnAPSlotIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 658	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 659	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 660
 661	bsnAPCoverageThresholdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 662	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 663	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 664
 665	bsnAPCoverageFailedClients&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 666	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 667	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 668
 669	bsnAPCoverageTotalClients&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 670	%parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 671	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 672
 673	bsnClientMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 674	%parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 675	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 676
 677	bsnClientRssi&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 678	%parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 679	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 680
 681	bsnClientSnr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 682	%parm[#9]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 683	</descr>
 684		<logmsg dest='logndisplay'>&lt;p&gt;
 685			bsnAPCoverageProfileFailed trap received 
 686			bsnAPMacAddrTrapVariable=%parm[#1]% 
 687			bsnAPNameTrapVariable=%parm[#2]% 
 688			bsnAPSlotIdTrapVariable=%parm[#3]% 
 689			bsnAPCoverageThresholdTrapVariable=%parm[#4]% 
 690			bsnAPCoverageFailedClients=%parm[#5]% 
 691			bsnAPCoverageTotalClients=%parm[#6]% 
 692			bsnClientMacAddr=%parm[#7]% 
 693			bsnClientRssi=%parm[#8]% 
 694			bsnClientSnr=%parm[#9]%&lt;/p&gt;
 695		</logmsg>
 696	<severity>Warning</severity>
 697	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
 698</event>
 699<event>
 700	<mask>
 701		<maskelement>
 702			<mename>id</mename>
 703			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 704		</maskelement>
 705		<maskelement>
 706			<mename>generic</mename>
 707			<mevalue>6</mevalue>
 708		</maskelement>
 709		<maskelement>
 710			<mename>specific</mename>
 711			<mevalue>15</mevalue>
 712		</maskelement>
 713	</mask>
 714	<uei>uei.opennms.org/vendor/cisco/bsnAPCurrentTxPowerChanged</uei>
 715	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCurrentTxPowerChanged</event-label>
 716	<descr>
 717&lt;p&gt;Whenever dynamic algorithms are running and 
 718bsnAPIfPhyPowerAutomaticOn is true, Airespace AP Interface's 
 719CurrentTxPower might get updated by algorithm. When
 720this occurs notification will be sent with Dot3 MAC address of
 721Airespace AP and slot ID of Airespace AP IF along with the 
 722currentTxPower for this Airespace AP IF&lt;/p&gt;&lt;table&gt;
 723	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 724
 725	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 726	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 727	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 728
 729	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 730	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 731	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 732
 733	bsnAPIfPhyTxPowerLevel&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 734	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 735	</descr>
 736		<logmsg dest='logndisplay'>&lt;p&gt;
 737			bsnAPCurrentTxPowerChanged trap received 
 738			bsnAPDot3MacAddress=%parm[#1]% 
 739			bsnAPIfSlotId=%parm[#2]% 
 740			bsnAPIfPhyTxPowerLevel=%parm[#3]%&lt;/p&gt;
 741		</logmsg>
 742	<severity>Normal</severity>
 743	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 744</event>
 745<event>
 746	<mask>
 747		<maskelement>
 748			<mename>id</mename>
 749			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 750		</maskelement>
 751		<maskelement>
 752			<mename>generic</mename>
 753			<mevalue>6</mevalue>
 754		</maskelement>
 755		<maskelement>
 756			<mename>specific</mename>
 757			<mevalue>16</mevalue>
 758		</maskelement>
 759	</mask>
 760	<uei>uei.opennms.org/vendor/cisco/bsnAPCurrentChannelChanged</uei>
 761	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCurrentChannelChanged</event-label>
 762	<descr>
 763&lt;p&gt;Whenever dynamic algorithms are running and 
 764bsnAPIfPhyChannelAutomaticOn is true, Airespace AP 
 765Interface's CurrentChannel might get updated by algorithm. 
 766When this occurs notification will be sent with Dot3 MAC 
 767address of Airespace AP and slot ID of Airespace AP IF along 
 768with the currentChannel for this Airespace AP IF&lt;/p&gt;&lt;table&gt;
 769	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 770
 771	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 772	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 773	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 774
 775	bsnAPSlotIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 776	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 777	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 778
 779	bsnAPChannelNumberTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 780	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 781	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 782
 783	bsnInterferenceEnergyBeforeChannelUpdate&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 784	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 785	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 786
 787	bsnInterferenceEnergyAfterChannelUpdate&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 788	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 789	</descr>
 790		<logmsg dest='logndisplay'>&lt;p&gt;
 791			bsnAPCurrentChannelChanged trap received 
 792			bsnAPMacAddrTrapVariable=%parm[#1]% 
 793			bsnAPSlotIdTrapVariable=%parm[#2]% 
 794			bsnAPChannelNumberTrapVariable=%parm[#3]% 
 795			bsnInterferenceEnergyBeforeChannelUpdate=%parm[#4]% 
 796			bsnInterferenceEnergyAfterChannelUpdate=%parm[#5]%&lt;/p&gt;
 797		</logmsg>
 798	<severity>Normal</severity>
 799	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 800</event>
 801<event>
 802	<mask>
 803		<maskelement>
 804			<mename>id</mename>
 805			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 806		</maskelement>
 807		<maskelement>
 808			<mename>generic</mename>
 809			<mevalue>6</mevalue>
 810		</maskelement>
 811		<maskelement>
 812			<mename>specific</mename>
 813			<mevalue>21</mevalue>
 814		</maskelement>
 815	</mask>
 816	<uei>uei.opennms.org/vendor/cisco/bsnRrmDot11aGroupingDone</uei>
 817	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRrmDot11aGroupingDone</event-label>
 818	<descr>
 819&lt;p&gt;When Grouping is done, this notification will be sent from the
 820previous Group Leader where grouping algorithm was run. It has
 821MAC address of the new Group Leader.&lt;/p&gt;&lt;table&gt;
 822	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 823
 824	bsnRrmDot11aGroupLeaderMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 825	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 826	</descr>
 827		<logmsg dest='logndisplay'>&lt;p&gt;
 828			bsnRrmDot11aGroupingDone trap received 
 829			bsnRrmDot11aGroupLeaderMacAddr=%parm[#1]%&lt;/p&gt;
 830		</logmsg>
 831	<severity>Normal</severity>
 832	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
 833</event>
 834<event>
 835	<mask>
 836		<maskelement>
 837			<mename>id</mename>
 838			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 839		</maskelement>
 840		<maskelement>
 841			<mename>generic</mename>
 842			<mevalue>6</mevalue>
 843		</maskelement>
 844		<maskelement>
 845			<mename>specific</mename>
 846			<mevalue>22</mevalue>
 847		</maskelement>
 848	</mask>
 849	<uei>uei.opennms.org/vendor/cisco/bsnRrmDot11bGroupingDone</uei>
 850	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRrmDot11bGroupingDone</event-label>
 851	<descr>
 852&lt;p&gt;When Grouping is done, this notification will be sent from the
 853previous Group Leader where grouping algorithm was run. It has
 854MAC address of the new Group Leader.&lt;/p&gt;&lt;table&gt;
 855	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 856
 857	bsnRrmDot11bGroupLeaderMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 858	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 859	</descr>
 860		<logmsg dest='logndisplay'>&lt;p&gt;
 861			bsnRrmDot11bGroupingDone trap received 
 862			bsnRrmDot11bGroupLeaderMacAddr=%parm[#1]%&lt;/p&gt;
 863		</logmsg>
 864	<severity>Normal</severity>
 865	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
 866</event>
 867<event>
 868	<mask>
 869		<maskelement>
 870			<mename>id</mename>
 871			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 872		</maskelement>
 873		<maskelement>
 874			<mename>generic</mename>
 875			<mevalue>6</mevalue>
 876		</maskelement>
 877		<maskelement>
 878			<mename>specific</mename>
 879			<mevalue>23</mevalue>
 880		</maskelement>
 881	</mask>
 882	<uei>uei.opennms.org/vendor/cisco/bsnConfigSaved</uei>
 883	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnConfigSaved</event-label>
 884	<descr>
 885&lt;p&gt;When configuration is save either from CLI or web interface
 886This trap will be sent to inform NMS to do refresh&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
 887	</descr>
 888		<logmsg dest='logndisplay'>&lt;p&gt;
 889			bsnConfigSaved trap received&lt;/p&gt;
 890		</logmsg>
 891	<severity>Indeterminate</severity>
 892</event>
 893<event>
 894	<mask>
 895		<maskelement>
 896			<mename>id</mename>
 897			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 898		</maskelement>
 899		<maskelement>
 900			<mename>generic</mename>
 901			<mevalue>6</mevalue>
 902		</maskelement>
 903		<maskelement>
 904			<mename>specific</mename>
 905			<mevalue>24</mevalue>
 906		</maskelement>
 907	</mask>
 908	<uei>uei.opennms.org/vendor/cisco/bsnDot11EssCreated</uei>
 909	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11EssCreated</event-label>
 910	<descr>
 911&lt;p&gt;Whenever a new Ess (WLAN) is created, this notification will 
 912be sent along with EssIndex&lt;/p&gt;&lt;table&gt;
 913	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 914
 915	bsnDot11EssIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 916	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 917	</descr>
 918		<logmsg dest='logndisplay'>&lt;p&gt;
 919			bsnDot11EssCreated trap received 
 920			bsnDot11EssIndex=%parm[#1]%&lt;/p&gt;
 921		</logmsg>
 922	<severity>Normal</severity>
 923	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
 924</event>
 925<event>
 926	<mask>
 927		<maskelement>
 928			<mename>id</mename>
 929			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 930		</maskelement>
 931		<maskelement>
 932			<mename>generic</mename>
 933			<mevalue>6</mevalue>
 934		</maskelement>
 935		<maskelement>
 936			<mename>specific</mename>
 937			<mevalue>25</mevalue>
 938		</maskelement>
 939	</mask>
 940	<uei>uei.opennms.org/vendor/cisco/bsnDot11EssDeleted</uei>
 941	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11EssDeleted</event-label>
 942	<descr>
 943&lt;p&gt;Whenever a Ess (WLAN)is deleted, this notification will be 
 944sent along with EssIndex&lt;/p&gt;&lt;table&gt;
 945	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 946
 947	bsnDot11EssIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 948	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 949	</descr>
 950		<logmsg dest='logndisplay'>&lt;p&gt;
 951			bsnDot11EssDeleted trap received 
 952			bsnDot11EssIndex=%parm[#1]%&lt;/p&gt;
 953		</logmsg>
 954	<severity>Warning</severity>
 955	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
 956</event>
 957<event>
 958	<mask>
 959		<maskelement>
 960			<mename>id</mename>
 961			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 962		</maskelement>
 963		<maskelement>
 964			<mename>generic</mename>
 965			<mevalue>6</mevalue>
 966		</maskelement>
 967		<maskelement>
 968			<mename>specific</mename>
 969			<mevalue>26</mevalue>
 970		</maskelement>
 971	</mask>
 972	<uei>uei.opennms.org/vendor/cisco/bsnRADIUSServerNotResponding</uei>
 973	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRADIUSServerNotResponding</event-label>
 974	<descr>
 975&lt;p&gt;This trap is to indicate that no RADIUS server(s) are responding
 976to authentication requests sent by the RADIUS client within the
 977MWAR device(Switch).&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
 978	</descr>
 979		<logmsg dest='logndisplay'>&lt;p&gt;
 980			bsnRADIUSServerNotResponding trap received&lt;/p&gt;
 981		</logmsg>
 982	<severity>Minor</severity>
 983	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
 984</event>
 985<event>
 986	<mask>
 987		<maskelement>
 988			<mename>id</mename>
 989			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 990		</maskelement>
 991		<maskelement>
 992			<mename>generic</mename>
 993			<mevalue>6</mevalue>
 994		</maskelement>
 995		<maskelement>
 996			<mename>specific</mename>
 997			<mevalue>27</mevalue>
 998		</maskelement>
 999		<varbind>
1000			<vbnumber>1</vbnumber>
1001			<vbvalue>1</vbvalue>
1002		</varbind>
1003	</mask>
1004	<uei>uei.opennms.org/vendor/cisco/bsnAuthenticationFailureMgmt</uei>
1005	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAuthenticationFailure</event-label>
1006	<descr>
1007&lt;p&gt;This trap is to inform that client authentication failure has
1008occured at MWAR(Switch). This could be cli/web user, wlan user, 
1009or Mac Authorized user. ServiceType will indicate which type of 
1010user it is and userName will be cli/web/wlan userName or 
1011MacAddress of Mac Authorized User&lt;/p&gt;&lt;table&gt;
1012	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1013
1014	bsnAuthFailureUserType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1015	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
1016		mgmtUser(1)
1017		wlanUser(2)
1018		macFilter(3)
1019	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1020	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1021
1022	bsnAuthFailureUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1023	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1024	</descr>
1025		<logmsg dest='logndisplay'>&lt;p&gt;
1026			bsnAuthenticationFailure trap received 
1027			bsnAuthFailureUserType=%parm[#1]% 
1028			bsnAuthFailureUserName=%parm[#2]%&lt;/p&gt;
1029		</logmsg>
1030	<severity>Warning</severity>
1031	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%" alarm-type="1" auto-clean="false" />
1032</event>
1033<event>
1034	<mask>
1035		<maskelement>
1036			<mename>id</mename>
1037			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1038		</maskelement>
1039		<maskelement>
1040			<mename>generic</mename>
1041			<mevalue>6</mevalue>
1042		</maskelement>
1043		<maskelement>
1044			<mename>specific</mename>
1045			<mevalue>27</mevalue>
1046		</maskelement>
1047	</mask>
1048	<uei>uei.opennms.org/vendor/cisco/bsnAuthenticationFailure</uei>
1049	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAuthenticationFailure</event-label>
1050	<descr>
1051&lt;p&gt;This trap is to inform that client authentication failure has
1052occured at MWAR(Switch). This could be cli/web user, wlan user, 
1053or Mac Authorized user. ServiceType will indicate which type of 
1054user it is and userName will be cli/web/wlan userName or 
1055MacAddress of Mac Authorized User&lt;/p&gt;&lt;table&gt;
1056	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1057
1058	bsnAuthFailureUserType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1059	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
1060		mgmtUser(1)
1061		wlanUser(2)
1062		macFilter(3)
1063	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1064	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1065
1066	bsnAuthFailureUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1067	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1068	</descr>
1069		<logmsg dest='logndisplay'>&lt;p&gt;
1070			bsnAuthenticationFailure trap received 
1071			bsnAuthFailureUserType=%parm[#1]% 
1072			bsnAuthFailureUserName=%parm[#2]%&lt;/p&gt;
1073		</logmsg>
1074	<severity>Normal</severity>
1075	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1076</event>
1077<event>
1078	<mask>
1079		<maskelement>
1080			<mename>id</mename>
1081			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1082		</maskelement>
1083		<maskelement>
1084			<mename>generic</mename>
1085			<mevalue>6</mevalue>
1086		</maskelement>
1087		<maskelement>
1088			<mename>specific</mename>
1089			<mevalue>28</mevalue>
1090		</maskelement>
1091	</mask>
1092	<uei>uei.opennms.org/vendor/cisco/bsnIpsecEspAuthFailureTrap</uei>
1093	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspAuthFailureTrap</event-label>
1094	<descr>
1095&lt;p&gt;IPsec packets with invalid hashes were found in an inbound
1096ESP SA. The total number of authentication errors
1097accumulated is sent for the specific row of the
1098ipsecSaEspInTable table for the SA; this provides the
1099identity of the SA in which the error occurred.
1100
1101Implementations SHOULD send one trap per SA (within a
1102reasonable time period), rather than sending one trap per
1103packet.&lt;/p&gt;&lt;table&gt;
1104	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1105
1106	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1107	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1108	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1109
1110	bsnIpsecErrorCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1111	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1112	</descr>
1113		<logmsg dest='logndisplay'>&lt;p&gt;
1114			bsnIpsecEspAuthFailureTrap trap received 
1115			bsnRemoteIPv4Address=%parm[#1]% 
1116			bsnIpsecErrorCount=%parm[#2]%&lt;/p&gt;
1117		</logmsg>
1118	<severity>Normal</severity>
1119	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1120</event>
1121<event>
1122	<mask>
1123		<maskelement>
1124			<mename>id</mename>
1125			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1126		</maskelement>
1127		<maskelement>
1128			<mename>generic</mename>
1129			<mevalue>6</mevalue>
1130		</maskelement>
1131		<maskelement>
1132			<mename>specific</mename>
1133			<mevalue>29</mevalue>
1134		</maskelement>
1135	</mask>
1136	<uei>uei.opennms.org/vendor/cisco/bsnIpsecEspReplayFailureTrap</uei>
1137	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspReplayFailureTrap</event-label>
1138	<descr>
1139&lt;p&gt;IPsec packets with invalid sequence numbers were found in
1140an inbound ESP SA. The total number of replay errors
1141accumulated is sent for the specific row of the
1142ipsecSaEspInTable table for the SA; this provides the
1143identity of the SA in which the error occurred.
1144
1145Implementations SHOULD send one trap per SA (within a
1146reasonable time period), rather than sending one trap per
1147packet.&lt;/p&gt;&lt;table&gt;
1148	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1149
1150	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1151	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1152	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1153
1154	bsnIpsecErrorCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1155	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1156	</descr>
1157		<logmsg dest='logndisplay'>&lt;p&gt;
1158			bsnIpsecEspReplayFailureTrap trap received 
1159			bsnRemoteIPv4Address=%parm[#1]% 
1160			bsnIpsecErrorCount=%parm[#2]%&lt;/p&gt;
1161		</logmsg>
1162	<severity>Warning</severity>
1163	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
1164</event>
1165<event>
1166	<mask>
1167		<maskelement>
1168			<mename>id</mename>
1169			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1170		</maskelement>
1171		<maskelement>
1172			<mename>generic</mename>
1173			<mevalue>6</mevalue>
1174		</maskelement>
1175		<maskelement>
1176			<mename>specific</mename>
1177			<mevalue>31</mevalue>
1178		</maskelement>
1179	</mask>
1180	<uei>uei.opennms.org/vendor/cisco/bsnIpsecEspInvalidSpiTrap</uei>
1181	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspInvalidSpiTrap</event-label>
1182	<descr>
1183&lt;p&gt;A packet with an unknown SPI was detected from the
1184specified peer with the specified SPI using the specified
1185protocol. The destination address of the received packet is
1186specified by ipsecLocalAddress.
1187
1188The value ifIndex may be 0 if this optional linkage is
1189unsupported.
1190
1191If the object ipsecSecurityProtocol has the value for
1192IPcomp, then the ipsecSPI object is the CPI of the packet.
1193
1194Implementations SHOULD send one trap per peer (within a
1195reasonable time period), rather than sending one trap per
1196packet.&lt;/p&gt;&lt;table&gt;
1197	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1198
1199	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1200	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1201	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1202
1203	bsnIpsecSPI&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1204	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1205	</descr>
1206		<logmsg dest='logndisplay'>&lt;p&gt;
1207			bsnIpsecEspInvalidSpiTrap trap received 
1208			bsnRemoteIPv4Address=%parm[#1]% 
1209			bsnIpsecSPI=%parm[#2]%&lt;/p&gt;
1210		</logmsg>
1211	<severity>Normal</severity>
1212	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1213</event>
1214<event>
1215	<mask>
1216		<maskelement>
1217			<mename>id</mename>
1218			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1219		</maskelement>
1220		<maskelement>
1221			<mename>generic</mename>
1222			<mevalue>6</mevalue>
1223		</maskelement>
1224		<maskelement>
1225			<mename>specific</mename>
1226			<mevalue>33</mevalue>
1227		</maskelement>
1228	</mask>
1229	<uei>uei.opennms.org/vendor/cisco/bsnIpsecIkeNegFailure</uei>
1230	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecIkeNegFailure</event-label>
1231	<descr>
1232&lt;p&gt;An attempt to negotiate a phase 1 IKE SA failed.
1233The notification counts are also sent as part of the trap,
1234along with the current value of the total negotiation error
1235counters for ISAKMP.&lt;/p&gt;&lt;table&gt;
1236	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1237
1238	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1239	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1240	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1241
1242	bsnRemoteUdpPort&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1243	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1244	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1245
1246	bsnIkeAuthMethod&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1247	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1248	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1249
1250	bsnIkeTotalInitFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1251	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1252	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1253
1254	bsnIkeTotalInitNoResponses&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1255	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1256	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1257
1258	bsnIkeTotalRespFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1259	%parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1260	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1261
1262	bsnNotifiesSent&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1263	%parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1264	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1265
1266	bsnNotifiesReceived&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1267	%parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1268	</descr>
1269		<logmsg dest='logndisplay'>&lt;p&gt;
1270			bsnIpsecIkeNegFailure trap received 
1271			bsnRemoteIPv4Address=%parm[#1]% 
1272			bsnRemoteUdpPort=%parm[#2]% 
1273			bsnIkeAuthMethod=%parm[#3]% 
1274			bsnIkeTotalInitFailures=%parm[#4]% 
1275			bsnIkeTotalInitNoResponses=%parm[#5]% 
1276			bsnIkeTotalRespFailures=%parm[#6]% 
1277			bsnNotifiesSent=%parm[#7]% 
1278			bsnNotifiesReceived=%parm[#8]%&lt;/p&gt;
1279		</logmsg>
1280	<severity>Normal</severity>
1281	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1282</event>
1283<event>
1284	<mask>
1285		<maskelement>
1286			<mename>id</mename>
1287			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1288		</maskelement>
1289		<maskelement>
1290			<mename>generic</mename>
1291			<mevalue>6</mevalue>
1292		</maskelement>
1293		<maskelement>
1294			<mename>specific</mename>
1295			<mevalue>34</mevalue>
1296		</maskelement>
1297	</mask>
1298	<uei>uei.opennms.org/vendor/cisco/bsnIpsecSuiteNegFailure</uei>
1299	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecSuiteNegFailure</event-label>
1300	<descr>
1301&lt;p&gt;An attempt to negotiate a phase 2 SA suite for the
1302specified selector failed.
1303The current total failure counts are passed as well as the
1304notification type counts for the notify involved in the
1305failure.&lt;/p&gt;&lt;table&gt;
1306	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1307
1308	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1309	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1310	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1311
1312	bsnSuiteInitFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1313	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1314	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1315
1316	bsnSuiteRespondFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1317	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1318	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1319
1320	bsnNotifiesSent&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1321	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1322	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1323
1324	bsnNotifiesReceived&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1325	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1326	</descr>
1327		<logmsg dest='logndisplay'>&lt;p&gt;
1328			bsnIpsecSuiteNegFailure trap received 
1329			bsnRemoteIPv4Address=%parm[#1]% 
1330			bsnSuiteInitFailures=%parm[#2]% 
1331			bsnSuiteRespondFailures=%parm[#3]% 
1332			bsnNotifiesSent=%parm[#4]% 
1333			bsnNotifiesReceived=%parm[#5]%&lt;/p&gt;
1334		</logmsg>
1335	<severity>Normal</severity>
1336	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1337</event>
1338<event>
1339	<mask>
1340		<maskelement>
1341			<mename>id</mename>
1342			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1343		</maskelement>
1344		<maskelement>
1345			<mename>generic</mename>
1346			<mevalue>6</mevalue>
1347		</maskelement>
1348		<maskelement>
1349			<mename>specific</mename>
1350			<mevalue>35</mevalue>
1351		</maskelement>
1352	</mask>
1353	<uei>uei.opennms.org/vendor/cisco/bsnIpsecInvalidCookieTrap</uei>
1354	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecInvalidCookieTrap</event-label>
1355	<descr>
1356&lt;p&gt;ISAKMP packets with invalid cookies were detected from the
1357specified source, intended for the specified destination.
1358
1359The initiator and responder cookies are also sent with the
1360trap.
1361
1362The current count is sent to allow the trap to accurately
1363relfect dropped and throttled traps.
1364
1365Implementations SHOULD send one trap per peer (within a
1366reasonable time period, rather than sending one trap per
1367packet.&lt;/p&gt;&lt;table&gt;
1368	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1369
1370	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1371	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1372	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1373
1374	bsnRemoteUdpPort&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1375	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1376	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1377
1378	bsnInitiatorCookie&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1379	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1380	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1381
1382	bsnResponderCookie&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1383	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1384	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1385
1386	bsnIsakmpInvalidCookies&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1387	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1388	</descr>
1389		<logmsg dest='logndisplay'>&lt;p&gt;
1390			bsnIpsecInvalidCookieTrap trap received 
1391			bsnRemoteIPv4Address=%parm[#1]% 
1392			bsnRemoteUdpPort=%parm[#2]% 
1393			bsnInitiatorCookie=%parm[#3]% 
1394			bsnResponderCookie=%parm[#4]% 
1395			bsnIsakmpInvalidCookies=%parm[#5]%&lt;/p&gt;
1396		</logmsg>
1397	<severity>Normal</severity>
1398	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1399</event>
1400<event>
1401	<mask>
1402		<maskelement>
1403			<mename>id</mename>
1404			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1405		</maskelement>
1406		<maskelement>
1407			<mename>generic</mename>
1408			<mevalue>6</mevalue>
1409		</maskelement>
1410		<maskelement>
1411			<mename>specific</mename>
1412			<mevalue>36</mevalue>
1413		</maskelement>
1414	</mask>
1415	<uei>uei.opennms.org/vendor/cisco/bsnRogueAPDetected</uei>
1416	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueAPDetected</event-label>
1417	<descr>
1418&lt;p&gt;When a Rogue AP is detected this Trap will be sent out along
1419with APMacAddress on which its detected&lt;/p&gt;&lt;table&gt;
1420	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1421
1422	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1423	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1424	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1425
1426	bsnRogueAPAirespaceAPMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1427	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1428	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1429
1430	bsnRogueAPAirespaceAPSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1431	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1432	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1433
1434	bsnRogueAPSsid&lt;/b&gt;&lt;/td&gt;&

Large files files are truncated, but you can click here to view the full file